All episodes
-
I Have Trust Issues & So Does My CISO
Ashley ’AJ’ Nurcombe, Sr. Cyber Sec Engineer/Corelight; Brandon Dunlap, Moderator
As organisations continue the push to Zero Trust, we’ve all got some Trust issues to work on. The best thing to do is get it all out in the open and don’t let your relationship with your networks get toxic. Moving to Zero Trust requires a good foundation that your organization can build trust on.
On 6 July 2023 join Corelight and (ISC)2 at 1:00 p.m. BST as we discuss how security teams can use network visibility to resolve trust issues in Zero Trust deployment and lay the groundwork for the future.
-
Busy Bees- The Transformation of Malicious Loader BumbleBee
Patrick Staubmann, Threat Researcher, VMRay; Brandon Dunlap, Moderator
Since its inception, the malware loader known as BumbleBee has been involved in numerous cyberattacks, delivering harmful payloads from known malware families. It has consistently showcased its ability to evolve and resist detection - a clear signal that its development is far from over. This makes BumbleBee an interesting and important object of research. To protect itself against manual as well as automated analysis, BumbleBee uses various techniques to detect isolated analysis environments. Most of this logic is taken from an open-source sandbox detection project.
Join VMRay and (ISC)2 on 27 July 2023 at 1 p.m. BST to hear insights into BumbleBee's modus operandi, focusing on its unique sandbox detection techniques. We’ll provide an in-depth analysis, discuss its trajectory, and outline a path forward for security teams.
-
What’s Changing in Ransomware for Asia Pacific: Who, What and How?
Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Despite the growing awareness of ransomware threats and an availability of numerous tools, the Asia Pacific and Japan (APJ) region continues to witness a significant rise in victim companies. In the latest State of the Internet report, Akamai’s threat researchers meticulously examine the evolving ransomware landscape. Gain deep insights into the ‘who, what, and how’ aspects, especially concerning APJ, alongside Reuben Koh, a contributor to the report.
Join us for this session to understand:
- The evolving tactics and prominent trends in ransomware
- Which ransomware operators are currently dominating the scene in APJ
- Which industries are bearing the brunt of these attacks
- The most potent attack techniques employed
- How to better defend against ransomwarePresenter: Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Moderator: Emily Kong, CISSP, CCSP -
Ransomware in the Wild: Lessons Learned
Adrian Sanabria, IANS Faculty; Brandon Dunlap, Moderator
The ransomware scourge continues to plague the cybersecurity industry. To help ensure you and your company are better prepared, we will share insights and lessons learned from ransomware case studies.
In this session, on September 12, 2023 at 1:00 p.m./ 10:00 a.m. Pacific IANS and (ISC)2 will lead you through:
• What went right (and wrong) in these examples and how best to incorporate that experience into your defenses and program
• Threat actor behavior and how to take advantage of their internal processes to thwart them
• TTPs used in various ransomware operations
• Alert monitoring – from investigating to remediating
• The reality and best practices around backups and recovery -
This Changes Everything: Ransomware in the Age of Artificial Intelligence
Fleming Shi, Chief Technology Officer; Anastasia Hurley, Principal Product Marketing Manager, Barracuda Networks
Artificial intelligence developers have made huge strides in recent months, transforming a wide variety of human endeavors. Unfortunately, that includes ransomware. Attend this webinar and get expert insights and forecasts about the trends we can expect to see as ransomware—already a significant and costly threat—gains new, AI-based capabilities, including:
- Extreme customization of phishing, smishing, and email attacks
- Relentless, automated attacks that could make current security strategies obsolete
- Extreme optimization of attacks, from finding vulnerabilities to ransom negotiationsPlus, see how you can fight back against the coming wave of threats using advanced strategies that incorporate AI. Like all technologies, AI can be used for good or ill. Attend this important webinar to understand how both threats and defensive strategies are being transformed by the AI revolution.
Presenter: Fleming Shi, Chief Technology Officer, Barracuda Networks AND Anastasia Hurley, Principal Product Marketing Manager, Barracuda Networks
Moderator: Yohanna Kho, CISSP -
Findings From the 2023 Identity Threat Report, Pt 2: Phishing & MFA Bypass
Sander Vinberg, F5 Threat Researcher; Brandon Dunlap, Moderator
Changes in how we build, run and secure information systems have also changed how we look at authentication and access control. The emerging concept of identity is transforming the ways that humans and non-human actors alike make use of data and compute power. At the same time, organizations’ focus on identity also means that it has become a focus for attackers. To assess the ways that old and new attacks are targeting digital identities, F5 Labs is presenting findings from our 2023 Identity Threat Report: The Unpatchables.
In a follow-up to the September session on credential stuffing, this talk will focus on phishing and multi-factor authentication bypass techniques. As phishing has grown over the last several years, its tools and tactics have transformed. We will identify which organizations are most targeted and explore recent developments that make it harder to spot and trickier to mitigate, using a combination of Dark Web intelligence and quantitative methods.
This talk on October 19, 2023 at 1:00 p.m. Eastern/10:00 a.m. Pacific will cover recent developments in attacker approaches to circumvent multi-factor authentication, what these developments mean for defenders, and which forms of MFA are able to resist the new approaches.
-
Living In an SEC Material World
Shannon Noonan, CEO, HiNoon; Scott Giordano, VP; Daniel Goldenberg, CISO, 7th Sense Security; Brandon Dunlap, Mod
Materiality is a focus point of the SEC’s new cybersecurity incident reporting rule. There are clear definitions of what material looks like in finance terms - to your CFO and CEO. What does material mean in cybersecurity?
Our panel of experts will discuss steps you can take to define what is material to the cybersecurity of your organization in terms the board of directors and C-suite will understand – and comply with the new rules.
Join us November 7, 2023 at 1:00 p.m. Eastern/10:00 a.m. Pacific as our panel of experts discusses this hot topic.